January 2019 Archives by author
Starting: Wed Jan 2 19:10:03 UTC 2019
Ending: Thu Jan 31 23:31:36 UTC 2019
Messages: 485
- [PATCH 17/17] module: Prevent module removal racing with text_poke()
Nadav Amit
- [PATCH 06/17] x86/alternative: use temporary mm for text poking
Nadav Amit
- [PATCH 06/17] x86/alternative: use temporary mm for text poking
Nadav Amit
- [PATCH 01/17] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
Nadav Amit
- [PATCH 01/17] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
Nadav Amit
- [PATCH 17/17] module: Prevent module removal racing with text_poke()
Nadav Amit
- [PATCH 01/17] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
Nadav Amit
- [PATCH 01/17] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
Nadav Amit
- [PATCH v2 03/20] x86/mm: temporary mm struct
Nadav Amit
- [GIT PULL] security: seccomp changes for v4.21
Tycho Andersen
- [GIT PULL] seccomp: build fix for v5.0-rc2
Tycho Andersen
- [PATCH 01/17] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
H. Peter Anvin
- [PATCH 17/17] module: Prevent module removal racing with text_poke()
H. Peter Anvin
- [PATCH 17/17] module: Prevent module removal racing with text_poke()
H. Peter Anvin
- [PATCH,RESEND] selftests: add TPM 2.0 tests
Thiago Jung Bauermann
- [PATCH 0/5] Extend TPM PPI interface to support revision 1.3
Stefan Berger
- [PATCH 1/5] tpm: ppi: pass function revision ID to tpm_eval_dsm()
Stefan Berger
- [PATCH 2/5] tpm: ppi: rename TPM_PPI_REVISION_ID to TPM_PPI_REVISION_1
Stefan Berger
- [PATCH 3/5] tpm: ppi: Display up to 101 operations as define for version 1.3
Stefan Berger
- [PATCH 4/5] tpm: ppi: Possibly show command parameter if TPM PPI 1.3 is used
Stefan Berger
- [PATCH 5/5] tpm: ppi: Enable submission of optional command parameter for PPI 1.3
Stefan Berger
- [PATCH 0/5] Extend TPM PPI interface to support revision 1.3
Stefan Berger
- [PATCH v2 0/5] Extend TPM PPI interface to support revision 1.3
Stefan Berger
- [PATCH v2 1/5] tpm: ppi: pass function revision ID to tpm_eval_dsm()
Stefan Berger
- [PATCH v2 2/5] tpm: ppi: rename TPM_PPI_REVISION_ID to TPM_PPI_REVISION_ID_1
Stefan Berger
- [PATCH v2 3/5] tpm: ppi: Display up to 101 operations as define for version 1.3
Stefan Berger
- [PATCH v2 4/5] tpm: ppi: Possibly show command parameter if TPM PPI 1.3 is used
Stefan Berger
- [PATCH v2 5/5] tpm: ppi: Enable submission of optional command parameter for PPI 1.3
Stefan Berger
- [PATCH v10 00/17] Remove nested TPM operations
Stefan Berger
- [git pull] vfs.git mount.part1
Eric W. Biederman
- [RFD] A mount api that notices previous mounts
Eric W. Biederman
- [RFD] A mount api that notices previous mounts
Eric W. Biederman
- [RFD] A mount api that notices previous mounts
Eric W. Biederman
- [PATCH 1/3] treewide: Lift switch variables out of switches
Ard Biesheuvel
- [PATCH v2] KEYS: always initialize keyring_index_key::desc_len
Eric Biggers
- [PATCH RESEND] KEYS: remove CONFIG_KEYS_COMPAT
Eric Biggers
- Getting weird TPM error after rebasing my tree to security/next-general
James Bottomley
- [PATCH v10 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
James Bottomley
- [PATCH v10 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
James Bottomley
- [PATCH v10 00/17] Remove nested TPM operations
James Bottomley
- [PATCH ghak103 V1] audit: add support for fcaps v3
Richard Guy Briggs
- actx not used?
Richard Guy Briggs
- [PATCH ghak107 V1] audit: remove unused actx param from audit_rule_match
Richard Guy Briggs
- [GIT PULL] security: seccomp changes for v4.21
Kees Cook
- [GIT PULL] security: seccomp changes for v4.21
Kees Cook
- [PATCH v2] LSM: generalize flag passing to security_capable
Kees Cook
- [PATCH v4] LSM: generalize flag passing to security_capable
Kees Cook
- [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
Kees Cook
- [GIT PULL] seccomp: build fix for v5.0-rc2
Kees Cook
- [GIT PULL] blob-stacking updates for security-next
Kees Cook
- [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
Kees Cook
- [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
Kees Cook
- yama: unsafe usage of ptrace_relation->tracer
Kees Cook
- [GIT PULL] blob-stacking updates for security-next
Kees Cook
- [PATCH v2] LSM: add SafeSetID module that gates setid calls
Kees Cook
- [PATCH v3 1/2] LSM: mark all set*uid call sites in kernel/sys.c
Kees Cook
- [PATCH v3 2/2] LSM: add SafeSetID module that gates setid calls
Kees Cook
- [PATCH v2] LSM: add SafeSetID module that gates setid calls
Kees Cook
- [PATCH v4 2/2] LSM: add SafeSetID module that gates setid calls
Kees Cook
- [PATCH] Yama: Check for pid death before checking ancestry
Kees Cook
- [PATCH] apparmor: Adjust offset when accessing task blob.
Kees Cook
- [PATCH 0/3] gcc-plugins: Introduce stackinit plugin
Kees Cook
- [PATCH 1/3] treewide: Lift switch variables out of switches
Kees Cook
- [PATCH 2/3] gcc-plugins: Introduce stackinit plugin
Kees Cook
- [PATCH 3/3] lib: Introduce test_stackinit module
Kees Cook
- [Intel-gfx] [PATCH 1/3] treewide: Lift switch variables out of switches
Kees Cook
- [Intel-gfx] [PATCH 1/3] treewide: Lift switch variables out of switches
Kees Cook
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
Kees Cook
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
Kees Cook
- [PATCH 00/17] Merge text_poke fixes and executable lockdowns
Rick Edgecombe
- [PATCH 01/17] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
Rick Edgecombe
- [PATCH 02/17] x86/jump_label: Use text_poke_early() during early init
Rick Edgecombe
- [PATCH 03/17] x86/mm: temporary mm struct
Rick Edgecombe
- [PATCH 04/17] fork: provide a function for copying init_mm
Rick Edgecombe
- [PATCH 05/17] x86/alternative: initializing temporary mm for patching
Rick Edgecombe
- [PATCH 06/17] x86/alternative: use temporary mm for text poking
Rick Edgecombe
- [PATCH 07/17] x86/kgdb: avoid redundant comparison of patched code
Rick Edgecombe
- [PATCH 08/17] x86/ftrace: set trampoline pages as executable
Rick Edgecombe
- [PATCH 09/17] x86/kprobes: Instruction pages initialization enhancements
Rick Edgecombe
- [PATCH 10/17] x86: avoid W^X being broken during modules loading
Rick Edgecombe
- [PATCH 11/17] x86/jump-label: remove support for custom poker
Rick Edgecombe
- [PATCH 12/17] x86/alternative: Remove the return value of text_poke_*()
Rick Edgecombe
- [PATCH 13/17] Add set_alias_ function and x86 implementation
Rick Edgecombe
- [PATCH 14/17] mm: Make hibernate handle unmapped pages
Rick Edgecombe
- [PATCH 15/17] vmalloc: New flags for safe vfree on special perms
Rick Edgecombe
- [PATCH 16/17] Plug in new special vfree flag
Rick Edgecombe
- [PATCH 17/17] module: Prevent module removal racing with text_poke()
Rick Edgecombe
- [PATCH v2 00/20] Merge text_poke fixes and executable lockdowns
Rick Edgecombe
- [PATCH v2 01/20] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
Rick Edgecombe
- [PATCH v2 02/20] x86/jump_label: Use text_poke_early() during early init
Rick Edgecombe
- [PATCH v2 03/20] x86/mm: temporary mm struct
Rick Edgecombe
- [PATCH v2 04/20] fork: provide a function for copying init_mm
Rick Edgecombe
- [PATCH v2 05/20] x86/alternative: initializing temporary mm for patching
Rick Edgecombe
- [PATCH v2 06/20] x86/alternative: use temporary mm for text poking
Rick Edgecombe
- [PATCH v2 07/20] x86/kgdb: avoid redundant comparison of patched code
Rick Edgecombe
- [PATCH v2 08/20] x86/ftrace: set trampoline pages as executable
Rick Edgecombe
- [PATCH v2 09/20] x86/kprobes: instruction pages initialization enhancements
Rick Edgecombe
- [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
Rick Edgecombe
- [PATCH v2 11/20] x86/jump-label: remove support for custom poker
Rick Edgecombe
- [PATCH v2 12/20] x86/alternative: Remove the return value of text_poke_*()
Rick Edgecombe
- [PATCH v2 13/20] Add set_alias_ function and x86 implementation
Rick Edgecombe
- [PATCH v2 14/20] mm: Make hibernate handle unmapped pages
Rick Edgecombe
- [PATCH v2 15/20] vmalloc: New flags for safe vfree on special perms
Rick Edgecombe
- [PATCH v2 16/20] modules: Use vmalloc special flag
Rick Edgecombe
- [PATCH v2 17/20] bpf: Use vmalloc special flag
Rick Edgecombe
- [PATCH v2 18/20] x86/ftrace: Use vmalloc special flag
Rick Edgecombe
- [PATCH v2 19/20] x86/kprobes: Use vmalloc special flag
Rick Edgecombe
- [PATCH v2 20/20] x86/alternative: comment about module removal races
Rick Edgecombe
- [PATCH 14/17] mm: Make hibernate handle unmapped pages
Edgecombe, Rick P
- [PATCH 14/17] mm: Make hibernate handle unmapped pages
Edgecombe, Rick P
- [PATCH] ima: remove CREDS_CHECK fall through
Matthew Garrett
- Getting weird TPM error after rebasing my tree to security/next-general
Jason Gunthorpe
- [PATCH ghak103 V1] audit: add support for fcaps v3
Serge E. Hallyn
- yama: unsafe usage of ptrace_relation->tracer
Tetsuo Handa
- [GIT PULL] blob-stacking updates for security-next
Tetsuo Handa
- [PATCH] LSM: Make lsm_early_cred() and lsm_early_task() local functions.
Tetsuo Handa
- [PATCH] tomoyo: Swicth from cred->security to task_struct->security.
Tetsuo Handa
- [PATCH v2] tomoyo: Swicth from cred->security to task_struct->security.
Tetsuo Handa
- [PATCH] tomoyo: Swicth from cred->security to task_struct->security.
Tetsuo Handa
- [PATCH v3] tomoyo: Swicth from cred->security to task_struct->security.
Tetsuo Handa
- [PATCH] apparmor: Adjust offset when accessing task blob.
Tetsuo Handa
- [PATCH v3] tomoyo: Swicth from cred->security to task_struct->security.
Tetsuo Handa
- [PATCH 1/2] tomoyo: Coding style fix.
Tetsuo Handa
- [PATCH 2/2] tomoyo: Allow multiple use_group lines.
Tetsuo Handa
- WARNING in apparmor_secid_to_secctx
Tetsuo Handa
- WARNING in apparmor_secid_to_secctx
Tetsuo Handa
- [PATCH] security/apparmor/domain: use PTR_ERR_OR_ZERO
Peng Hao
- [PATCH] security/selinux/hooks: remove unneeded semicolon
Peng Hao
- Your photos are ready?
Helen
- [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
Tejun Heo
- [PATCH v2 3/3] kernfs: Initialize security of newly created nodes
Tejun Heo
- [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
Tejun Heo
- [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
Tejun Heo
- [PATCH v3 5/5] kernfs: initialize security of newly created nodes
Tejun Heo
- [PATCH v3 5/5] kernfs: initialize security of newly created nodes
Tejun Heo
- [PATCH 01/17] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
Masami Hiramatsu
- [PATCH 09/17] x86/kprobes: Instruction pages initialization enhancements
Masami Hiramatsu
- [PATCH 17/17] module: Prevent module removal racing with text_poke()
Masami Hiramatsu
- [PATCH 17/17] module: Prevent module removal racing with text_poke()
Masami Hiramatsu
- [PATCH 17/17] module: Prevent module removal racing with text_poke()
Masami Hiramatsu
- [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
Jann Horn
- [PATCH 1/3] treewide: Lift switch variables out of switches
Jann Horn
- Enhancing the photos
Jane
- Email from yesterday
Jane
- WARNING in apparmor_cred_free
John Johansen
- [PATCH] security/apparmor/domain: use PTR_ERR_OR_ZERO
John Johansen
- WARNING in apparmor_cred_free
John Johansen
- WARNING in apparmor_cred_free
John Johansen
- [PATCH] security: mark expected switch fall-throughs
John Johansen
- [PATCH 1/3] treewide: Lift switch variables out of switches
Greg KH
- [Intel-gfx] [PATCH 1/3] treewide: Lift switch variables out of switches
Greg KH
- Dearest Friend
Mercy Kings
- [PATCH 1/3] treewide: Lift switch variables out of switches
William Kucharski
- [PATCH AUTOSEL 4.20 117/304] smack: fix access permissions for keyring
Sasha Levin
- [PATCH AUTOSEL 4.19 100/258] smack: fix access permissions for keyring
Sasha Levin
- [PATCH AUTOSEL 4.14 064/170] smack: fix access permissions for keyring
Sasha Levin
- [PATCH AUTOSEL 4.9 039/107] smack: fix access permissions for keyring
Sasha Levin
- [PATCH AUTOSEL 4.4 29/80] smack: fix access permissions for keyring
Sasha Levin
- [PATCH AUTOSEL 3.18 21/61] smack: fix access permissions for keyring
Sasha Levin
- Data entry service and data processing services
Linda
- [PATCH 06/17] x86/alternative: use temporary mm for text poking
Andy Lutomirski
- [PATCH 06/17] x86/alternative: use temporary mm for text poking
Andy Lutomirski
- [PATCH 1/3] security: keys: annotate implicit fall through
Mathieu Malaterre
- [PATCH 2/3] security: keys: annotate implicit fall throughs
Mathieu Malaterre
- [PATCH 3/3] security: keys: annotate implicit fall throughs
Mathieu Malaterre
- [PATCH] capabilities:: annotate implicit fall through
Mathieu Malaterre
- [GIT PULL] security: seccomp changes for v4.21
Ingo Molnar
- [GIT PULL] security: seccomp changes for v4.21
Ingo Molnar
- [GIT PULL] seccomp: build fix for v5.0-rc2
Ingo Molnar
- [GIT PULL] seccomp: build fix for v5.0-rc2
Ingo Molnar
- [PATCH] security/selinux/hooks: remove unneeded semicolon
Paul Moore
- [GIT PULL] blob-stacking updates for security-next
Paul Moore
- [GIT PULL] blob-stacking updates for security-next
Paul Moore
- [PATCH v2 1/3] LSM: Add new hook for generic node initialization
Paul Moore
- [PATCH 2/3] selinux: Implement the object_init_security hook
Paul Moore
- [PATCH 3/3] kernfs: Initialize security of newly created nodes
Paul Moore
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Paul Moore
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Paul Moore
- [GIT PULL] SELinux fixes for v5.0 (#1)
Paul Moore
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Paul Moore
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Paul Moore
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Paul Moore
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Paul Moore
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Paul Moore
- [PATCH ghak103 V1] audit: add support for fcaps v3
Paul Moore
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Paul Moore
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Paul Moore
- actx not used?
Paul Moore
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Paul Moore
- [GIT PULL] security: seccomp changes for v4.21
James Morris
- [GIT PULL] security: general updates for v4.21
James Morris
- [GIT PULL] seccomp: build fix for v5.0-rc2
James Morris
- [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
James Morris
- [GIT PULL] blob-stacking updates for security-next
James Morris
- [GIT PULL] blob-stacking updates for security-next
James Morris
- [PATCH v4] LSM: generalize flag passing to security_capable
James Morris
- [PATCH v2] LSM: add SafeSetID module that gates setid calls
James Morris
- [PATCH] Yama: Check for pid death before checking ancestry
James Morris
- [PATCH] Yama: Check for pid death before checking ancestry
James Morris
- WARNING in apparmor_cred_free
James Morris
- WARNING in apparmor_cred_free
James Morris
- WARNING in apparmor_cred_free
James Morris
- [GIT PULL] Security subsystem fixes for v5.0-rc3
James Morris
- [PATCH -next] LSM: Make some functions static
James Morris
- [PATCH] LSM: Make lsm_early_cred() and lsm_early_task() local functions.
James Morris
- [PATCH -next] LSM: Make some functions static
James Morris
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
James Morris
- [PATCH] apparmor: Adjust offset when accessing task blob.
James Morris
- Security tree sync to v5.0-rc3
James Morris
- [PATCH] capabilities:: annotate implicit fall through
James Morris
- [PATCH 1/3] security: keys: annotate implicit fall through
James Morris
- [PATCH v3] tomoyo: Swicth from cred->security to task_struct->security.
James Morris
- [PATCH v3] tomoyo: Swicth from cred->security to task_struct->security.
James Morris
- [PATCH 1/2] tomoyo: Coding style fix.
James Morris
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
James Morris
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
James Morris
- [PATCH] LSM: Add 'name' field for SafeSetID in DEFINE_LSM
James Morris
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
James Morris
- [PATCH] LSM: SafeSetID: 'depend' on CONFIG_SECURITY
James Morris
- [PATCH] LSM: SafeSetID: remove unused include
James Morris
- [PATCH v2] LSM: generalize flag passing to security_capable
Micah Morton
- [PATCH v2] LSM: generalize flag passing to security_capable
Micah Morton
- [PATCH v2] LSM: generalize flag passing to security_capable
Micah Morton
- [PATCH v2] LSM: generalize flag passing to security_capable
Micah Morton
- [PATCH v4] LSM: generalize flag passing to security_capable
Micah Morton
- [PATCH v4] LSM: generalize flag passing to security_capable
Micah Morton
- [PATCH v2] LSM: add SafeSetID module that gates setid calls
Micah Morton
- [PATCH v2] LSM: add SafeSetID module that gates setid calls
Micah Morton
- [PATCH v3 2/2] LSM: add SafeSetID module that gates setid calls
Micah Morton
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
Micah Morton
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
Micah Morton
- [PATCH v3 1/2] LSM: add SafeSetID module that gates setid calls
Micah Morton
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
Micah Morton
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
Micah Morton
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
Micah Morton
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
Micah Morton
- linux-next: Tree for Jan 29 (security/safesetid/)
Micah Morton
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
Micah Morton
- WARNING in apparmor_secid_to_secctx
Micah Morton
- [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
Ondrej Mosnacek
- [PATCH 1/3] LSM: Add new hook for generic node initialization
Ondrej Mosnacek
- [PATCH 2/3] selinux: Implement the object_init_security hook
Ondrej Mosnacek
- [PATCH 3/3] kernfs: Initialize security of newly created nodes
Ondrej Mosnacek
- [PATCH 1/3] LSM: Add new hook for generic node initialization
Ondrej Mosnacek
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Ondrej Mosnacek
- [PATCH v2 1/3] LSM: Add new hook for generic node initialization
Ondrej Mosnacek
- [PATCH v2 2/3] selinux: Implement the object_init_security hook
Ondrej Mosnacek
- [PATCH v2 3/3] kernfs: Initialize security of newly created nodes
Ondrej Mosnacek
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Ondrej Mosnacek
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Ondrej Mosnacek
- [PATCH v2 1/3] LSM: Add new hook for generic node initialization
Ondrej Mosnacek
- [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
Ondrej Mosnacek
- [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
Ondrej Mosnacek
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Ondrej Mosnacek
- [PATCH v3 0/5] Allow initializing the kernfs node's secctx based on its parent
Ondrej Mosnacek
- [PATCH v3 1/5] selinux: try security xattr after genfs for kernfs filesystems
Ondrej Mosnacek
- [PATCH v3 2/5] kernfs: use simple_xattrs for security attributes
Ondrej Mosnacek
- [PATCH v3 3/5] LSM: add new hook for kernfs node initialization
Ondrej Mosnacek
- [PATCH v3 4/5] selinux: implement the kernfs_init_security hook
Ondrej Mosnacek
- [PATCH v3 5/5] kernfs: initialize security of newly created nodes
Ondrej Mosnacek
- [PATCH v3 5/5] kernfs: initialize security of newly created nodes
Ondrej Mosnacek
- yama: unsafe usage of ptrace_relation->tracer
Oleg Nesterov
- [Intel-gfx] [PATCH 1/3] treewide: Lift switch variables out of switches
Jani Nikula
- [Intel-gfx] [PATCH 1/3] treewide: Lift switch variables out of switches
Jani Nikula
- [Intel-gfx] [PATCH 1/3] treewide: Lift switch variables out of switches
Jani Nikula
- [PATCH 01/17] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
Borislav Petkov
- [PATCH v2 03/20] x86/mm: temporary mm struct
Borislav Petkov
- [PATCH 0/3] gcc-plugins: Introduce stackinit plugin
Alexander Popov
- [PATCH 0/5] Extend TPM PPI interface to support revision 1.3
Safford, David (GE Global Research)
- [PATCH] selftests: add TPM 2.0 tests
Jarkko Sakkinen
- [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
Jarkko Sakkinen
- [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
Jarkko Sakkinen
- [PATCH v10 00/17] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v10 01/17] tpm: use tpm_buf in tpm_transmit_cmd() as the IO parameter
Jarkko Sakkinen
- [PATCH v10 02/17] tpm: fix invalid return value in pubek_show()
Jarkko Sakkinen
- [PATCH v10 03/17] tpm: return 0 from pcrs_show() when tpm1_pcr_read() fails
Jarkko Sakkinen
- [PATCH v10 04/17] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
Jarkko Sakkinen
- [PATCH v10 05/17] tpm: declare struct tpm_header
Jarkko Sakkinen
- [PATCH v10 06/17] tpm: access command header through struct in tpm_try_transmit()
Jarkko Sakkinen
- [PATCH v10 07/17] tpm: encapsulate tpm_dev_transmit()
Jarkko Sakkinen
- [PATCH v10 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
Jarkko Sakkinen
- [PATCH v10 09/17] tpm: clean up tpm_try_transmit() error handling flow
Jarkko Sakkinen
- [PATCH v10 10/17] tpm: move tpm_validate_commmand() to tpm2-space.c
Jarkko Sakkinen
- [PATCH v10 11/17] tpm: move TPM space code out of tpm_transmit()
Jarkko Sakkinen
- [PATCH v10 12/17] tpm: remove @space from tpm_transmit()
Jarkko Sakkinen
- [PATCH v10 13/17] tpm: use tpm_try_get_ops() in tpm-sysfs.c.
Jarkko Sakkinen
- [PATCH v10 14/17] tpm: remove TPM_TRANSMIT_UNLOCKED flag
Jarkko Sakkinen
- [PATCH v10 15/17] tpm: introduce tpm_chip_start() and tpm_chip_stop()
Jarkko Sakkinen
- [PATCH v10 16/17] tpm: take TPM chip power gating out of tpm_transmit()
Jarkko Sakkinen
- [PATCH v10 17/17] tpm: remove @flags from tpm_transmit()
Jarkko Sakkinen
- [PATCH,RESEND] selftests: add TPM 2.0 tests
Jarkko Sakkinen
- [PATCH 1/5] tpm: ppi: pass function revision ID to tpm_eval_dsm()
Jarkko Sakkinen
- [PATCH 2/5] tpm: ppi: rename TPM_PPI_REVISION_ID to TPM_PPI_REVISION_1
Jarkko Sakkinen
- [PATCH 3/5] tpm: ppi: Display up to 101 operations as define for version 1.3
Jarkko Sakkinen
- [PATCH 4/5] tpm: ppi: Possibly show command parameter if TPM PPI 1.3 is used
Jarkko Sakkinen
- [PATCH 4/5] tpm: ppi: Possibly show command parameter if TPM PPI 1.3 is used
Jarkko Sakkinen
- [PATCH 5/5] tpm: ppi: Enable submission of optional command parameter for PPI 1.3
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- [PATCH 0/5] Extend TPM PPI interface to support revision 1.3
Jarkko Sakkinen
- [PATCH,RESEND] selftests: add TPM 2.0 tests
Jarkko Sakkinen
- [PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- [PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Jarkko Sakkinen
- [PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- [PATCH v2 2/5] tpm: ppi: rename TPM_PPI_REVISION_ID to TPM_PPI_REVISION_ID_1
Jarkko Sakkinen
- [PATCH v2 4/5] tpm: ppi: Possibly show command parameter if TPM PPI 1.3 is used
Jarkko Sakkinen
- [PATCH v2 5/5] tpm: ppi: Enable submission of optional command parameter for PPI 1.3
Jarkko Sakkinen
- [PATCH v2 5/5] tpm: ppi: Enable submission of optional command parameter for PPI 1.3
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- [PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- [PATCH v10 00/17] Remove nested TPM operations
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- [PATCH v10 00/17] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v10 00/17] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v10 00/17] Remove nested TPM operations
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- [PATCH v10 00/17] Remove nested TPM operations
Jarkko Sakkinen
- [PATCH v10 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
Jarkko Sakkinen
- [PATCH v8 1/7] tpm: dynamically allocate the allocated_banks array
Jarkko Sakkinen
- [PATCH v8 2/7] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
Jarkko Sakkinen
- [PATCH v8 4/7] tpm: retrieve digest size of unknown algorithms with PCR read
Jarkko Sakkinen
- [PATCH v8 5/7] tpm: move tpm_chip definition to include/linux/tpm.h
Jarkko Sakkinen
- [PATCH v8 6/7] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
Jarkko Sakkinen
- [PATCH v8 7/7] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Jarkko Sakkinen
- [PATCH v10 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
Jarkko Sakkinen
- [PATCH v8 1/7] tpm: dynamically allocate the allocated_banks array
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- [PATCH v8 5/7] tpm: move tpm_chip definition to include/linux/tpm.h
Jarkko Sakkinen
- [PATCH 2/2] tpm: don't print error message in tpm_transmit_cmd when tpm still testing
Jarkko Sakkinen
- [PATCH v10 00/17] Remove nested TPM operations
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- Getting weird TPM error after rebasing my tree to security/next-general
Jarkko Sakkinen
- [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
Mickaël Salaün
- [RFC PATCH v1 3/5] Yama: Enforces noexec mounts or file executability through O_MAYEXEC
Mickaël Salaün
- [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
Roberto Sassu
- [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
Roberto Sassu
- [PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Roberto Sassu
- [PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Roberto Sassu
- [PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Roberto Sassu
- [PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Roberto Sassu
- [PATCH v8 0/7] tpm: retrieve digest size of unknown algorithms from TPM
Roberto Sassu
- [PATCH v8 1/7] tpm: dynamically allocate the allocated_banks array
Roberto Sassu
- [PATCH v8 2/7] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
Roberto Sassu
- [PATCH v8 3/7] tpm: rename and export tpm2_digest and tpm2_algorithms
Roberto Sassu
- [PATCH v8 4/7] tpm: retrieve digest size of unknown algorithms with PCR read
Roberto Sassu
- [PATCH v8 5/7] tpm: move tpm_chip definition to include/linux/tpm.h
Roberto Sassu
- [PATCH v8 6/7] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
Roberto Sassu
- [PATCH v8 7/7] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
Roberto Sassu
- [PATCH v8 1/7] tpm: dynamically allocate the allocated_banks array
Roberto Sassu
- [PATCH v8 5/7] tpm: move tpm_chip definition to include/linux/tpm.h
Roberto Sassu
- [PATCH v2] LSM: generalize flag passing to security_capable
Casey Schaufler
- [PATCH v2] LSM: generalize flag passing to security_capable
Casey Schaufler
- [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
Casey Schaufler
- [PATCH v5 00/38] LSM: Module stacking for SARA and Landlock
Casey Schaufler
- [PATCH v2 1/3] LSM: Add new hook for generic node initialization
Casey Schaufler
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Casey Schaufler
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Casey Schaufler
- Sorry, trying to get a message to the list
Casey Schaufler
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Casey Schaufler
- [GIT PULL] blob-stacking updates for security-next
Casey Schaufler
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Casey Schaufler
- [PATCH v2 1/3] LSM: Add new hook for generic node initialization
Casey Schaufler
- WARNING in apparmor_cred_free
Casey Schaufler
- WARNING in apparmor_cred_free
Casey Schaufler
- WARNING in apparmor_cred_free
Casey Schaufler
- WARNING in apparmor_cred_free
Casey Schaufler
- WARNING in apparmor_cred_free
Casey Schaufler
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Casey Schaufler
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
Casey Schaufler
- evm_inode_init_security and module stacking
Casey Schaufler
- [PATCH] tomoyo: Swicth from cred->security to task_struct->security.
Casey Schaufler
- [PATCH] tomoyo: Swicth from cred->security to task_struct->security.
Casey Schaufler
- evm_inode_init_security and module stacking
Casey Schaufler
- [PATCH] LSM: Make lsm_early_cred() and lsm_early_task() local functions.
Casey Schaufler
- [PATCH -next] LSM: Make some functions static
Casey Schaufler
- evm_inode_init_security and module stacking
Casey Schaufler
- [PATCH] security: mark expected switch fall-throughs
Casey Schaufler
- [RFD] A mount api that notices previous mounts
Casey Schaufler
- [RFD] A mount api that notices previous mounts
Casey Schaufler
- actx not used?
Casey Schaufler
- [PATCH v3 5/5] kernfs: initialize security of newly created nodes
Casey Schaufler
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Nazarov Sergey
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Nazarov Sergey
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Nazarov Sergey
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Nazarov Sergey
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Nazarov Sergey
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Nazarov Sergey
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Nazarov Sergey
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Nazarov Sergey
- Kernel memory corruption in CIPSO labeled TCP packets processing.
Nazarov Sergey
- [PATCH v1] evm: Use defined constant for UUID representation
Andy Shevchenko
- [PATCH] capabilities:: annotate implicit fall through
Gustavo A. R. Silva
- [PATCH] security: mark expected switch fall-throughs
Gustavo A. R. Silva
- [PATCH] security: mark expected switch fall-throughs
Gustavo A. R. Silva
- [PATCH] security: mark expected switch fall-throughs
Gustavo A. R. Silva
- [PATCH] ima: remove CREDS_CHECK fall through
Gustavo A. R. Silva
- [PATCH] security: mark expected switch fall-throughs
Gustavo A. R. Silva
- [PATCH] security: mark expected switch fall-throughs
Gustavo A. R. Silva
- [PATCH 1/3] LSM: Add new hook for generic node initialization
Stephen Smalley
- [PATCH 2/3] selinux: Implement the object_init_security hook
Stephen Smalley
- [PATCH 3/3] kernfs: Initialize security of newly created nodes
Stephen Smalley
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Stephen Smalley
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Stephen Smalley
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Stephen Smalley
- [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
Stephen Smalley
- [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
Stephen Smalley
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Stephen Smalley
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent
Stephen Smalley
- [PATCH v10 00/17] Remove nested TPM operations
Jerry Snitselaar
- [PATCH 1/2] tpm: don't return bool from update_timeouts
Jerry Snitselaar
- [PATCH 2/2] tpm: don't print error message in tpm_transmit_cmd when tpm still testing
Jerry Snitselaar
- Getting weird TPM error after rebasing my tree to security/next-general
Jerry Snitselaar
- [RFC PATCH 1/1] KEYS, integrity: Link .platform keyring to .secondary_trusted_keys
Kairui Song
- [PATCH] security: keys: add NULL checking for key->type->instantiate
Geliang Tang
- Getting weird TPM error after rebasing my tree to security/next-general
Linus Torvalds
- Getting weird TPM error after rebasing my tree to security/next-general
Linus Torvalds
- Getting weird TPM error after rebasing my tree to security/next-general
Linus Torvalds
- Getting weird TPM error after rebasing my tree to security/next-general
Linus Torvalds
- Getting weird TPM error after rebasing my tree to security/next-general
Linus Torvalds
- Getting weird TPM error after rebasing my tree to security/next-general
Linus Torvalds
- Getting weird TPM error after rebasing my tree to security/next-general
Linus Torvalds
- [git pull] vfs.git mount.part1
Al Viro
- WARNING in apparmor_cred_free
Dmitry Vyukov
- INFO: rcu detected stall in rw_verify_area
Dmitry Vyukov
- WARNING in apparmor_secid_to_secctx
Dmitry Vyukov
- [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
Daniel Walsh
- [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent
Daniel Walsh
- [Intel-gfx] [PATCH 1/3] treewide: Lift switch variables out of switches
Matthew Wilcox
- [PATCH v10 00/17] Remove nested TPM operations
Winkler, Tomas
- [PATCH v10 00/17] Remove nested TPM operations
Winkler, Tomas
- Getting weird TPM error after rebasing my tree to security/next-general
Winkler, Tomas
- Getting weird TPM error after rebasing my tree to security/next-general
Winkler, Tomas
- [PATCH -next] LSM: Make some functions static
Wei Yongjun
- [RFC PATCH 1/1] KEYS, integrity: Link .platform keyring to .secondary_trusted_keys
Dave Young
- [PATCH -next] LSM: Make some functions static
YueHaibing
- [PATCH -next] LSM: Make some functions static
YueHaibing
- [PATCH -next] evm: remove set but not used variable 'xattr'
YueHaibing
- [PATCH 00/17] Merge text_poke fixes and executable lockdowns
Peter Zijlstra
- [Intel-gfx] [PATCH 1/3] treewide: Lift switch variables out of switches
Edwin Zimmerman
- [PATCH 1/3] treewide: Lift switch variables out of switches
Edwin Zimmerman
- [RFC PATCH 1/1] KEYS, integrity: Link .platform keyring to .secondary_trusted_keys
Mimi Zohar
- [GIT PULL] security: general updates for v4.21
Mimi Zohar
- [RFC PATCH 1/1] KEYS, integrity: Link .platform keyring to .secondary_trusted_keys
Mimi Zohar
- evm_inode_init_security and module stacking
Mimi Zohar
- evm_inode_init_security and module stacking
Mimi Zohar
- [PATCH -next] evm: remove set but not used variable 'xattr'
Mimi Zohar
- [PATCH] security: mark expected switch fall-throughs
Mimi Zohar
- [PATCH] ima: remove CREDS_CHECK fall through
Mimi Zohar
- [PATCH 0/3] selftest/ima: add kexec_file_load test
Mimi Zohar
- [PATCH 1/3] selftest/ima: cleanup the kexec selftest
Mimi Zohar
- [PATCH 2/3] scripts/ima: define a set of common functions
Mimi Zohar
- [PATCH 3/3] selftests/ima: kexec_file_load syscall test
Mimi Zohar
- [PATCH] ima: requiring signed kernel modules
Mimi Zohar
- [PATCH] x86/ima: require signed kernel modules
Mimi Zohar
- [PATCH] security: mark expected switch fall-throughs
Mimi Zohar
- [PATCH] security: mark expected switch fall-throughs
Mimi Zohar
- [PATCH v3] LSM: generalize flag passing to security_capable
mortonm at chromium.org
- [PATCH v4] LSM: generalize flag passing to security_capable
mortonm at chromium.org
- [PATCH v2] LSM: add SafeSetID module that gates setid calls
mortonm at chromium.org
- [PATCH v3 1/2] LSM: mark all set*uid call sites in kernel/sys.c
mortonm at chromium.org
- [PATCH v3 2/2] LSM: add SafeSetID module that gates setid calls
mortonm at chromium.org
- [PATCH v4 2/2] LSM: add SafeSetID module that gates setid calls
mortonm at chromium.org
- [PATCH v5 2/2] LSM: add SafeSetID module that gates setid calls
mortonm at chromium.org
- [PATCH v3 1/2] LSM: add SafeSetID module that gates setid calls
mortonm at chromium.org
- [PATCH] LSM: Add 'name' field for SafeSetID in DEFINE_LSM
mortonm at chromium.org
- [PATCH] LSM: SafeSetID: 'depend' on CONFIG_SECURITY
mortonm at chromium.org
- [PATCH] LSM: SafeSetID: remove unused include
mortonm at chromium.org
- [GIT PULL] security: integrity updates for v4.21
pr-tracker-bot at kernel.org
- [GIT PULL] security: seccomp changes for v4.21
pr-tracker-bot at kernel.org
- [GIT PULL] security: Smack changes for v4.21
pr-tracker-bot at kernel.org
- [GIT PULL] security: TPM changes for v4.21
pr-tracker-bot at kernel.org
- [GIT PULL] SELinux fixes for v5.0 (#1)
pr-tracker-bot at kernel.org
- [GIT PULL] Security subsystem fixes for v5.0-rc3
pr-tracker-bot at kernel.org
- [security:next-general 83/85] security/safesetid/lsm.c:17:10: fatal error: asm/syscall.h: No such file or directory
kbuild test robot
- WARNING in apparmor_cred_free
syzbot
- INFO: rcu detected stall in rw_verify_area
syzbot
- [PATCH 01/17] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
hpa at zytor.com
- [PATCH 06/17] x86/alternative: use temporary mm for text poking
hpa at zytor.com
- [PATCH 01/17] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
hpa at zytor.com
Last message date:
Thu Jan 31 23:31:36 UTC 2019
Archived on: Thu Jan 31 23:31:43 UTC 2019
This archive was generated by
Pipermail 0.09 (Mailman edition).